SlideShare uma empresa Scribd logo
1 de 93
https://learn.extension.org/events/2326
Identity Theft:
How to Reduce Your Risk
1
Connecting military family service providers
to research and to each other
through innovative online programming
www.extension.org/militaryfamilies
MFLN Intro
Sign up for webinar email notifications at www.extension.org/62831
2
Connecting military family service providers
to research and to each other
through innovative online programming
MFLN Intro
Join the Conversation Online!
3
Join the Conversation Online!
MFLN Personal Finance
MFLN Personal Finance @MFLNPF
MFLN Group https://www.linkedin.com/groups/8409844
PF SMS icons
PF SMS icons
Military Families Learning Network
4
Dr. Barbara O’Neill
•Financial Resource Management Specialist for
Rutgers Cooperative Extension
•Has been a professional, financial educator and
author for more than 35 years.
•Has written more than 1,500 articles for
academic journals, conference proceedings &
other professional publications.
Today’s Presenters
5
Carol Kando-Pineda
•Counsel in the FTC’s Division of Consumer &
Business Education
•She leads FTC teams to create and distribute
free resources to help people spot, stop and
avoid fraud, manage their money and make wise
buys.
•She began her FTC career as a staff attorney
bringing false advertising claims.
Question #1:
Has Anyone (or Family Member)
Been an ID Theft Victim?
• Describe the situation
• Who was the fraudster (if known)?
• How was the case resolved?
6
Back in the Day….
What did people do when they
wanted to steal a lot of
money?
7
Some Famous Bank Robbers in
U.S. History
• Bonnie and Clyde
• John Dillinger
• Willie Sutton
8
Today Most Financial Theft Is Done
Through Identity Theft
• A major white-collar crime:
https://www.fbi.gov/about-us/investigate/white_collar
• Thief may not know victim
• No need to use physical violence
• Less risk of being caught
• Technology and carelessness with data help thieves
9
What Is Identity Theft?
 Fraud committed via the stealing and unlawful
use of key pieces of personal identification
information (PII)
 In other words, when bad things happen to
someone’s good name.
10
Identity Theft Is in the News!
11
What Personal Information Is
Stolen by Identity Thieves?
12
Sources of Personal Information
1313
Signs of Identity Theft
• Items in your credit report that aren’t yours
• Calls or letters from creditors, medical providers, or law
enforcement
• Negative notification at a critical point in life
– Buying a home or car
– Applying for a job
• Zero balances in bank accounts
• When a child starts getting credit offers or debt calls
• Delay in processing an income tax refund
• Other?
14
Are YOU at Risk For Identity Theft?
Take this 15-question quiz adapted from
Experian to find out
The lower your score, the better
15
1. You receive offers of pre-approved credit and, if you
decide not to accept them, you do not shred them (10
points)
2. You carry your Social Security card (or other
document with your SS number on it) in your wallet (10
points)
3. You do not have a post office box or a locked,
secured mailbox (5 points)
4. You drop off your outgoing mail at an open, unlocked
box or basket (10 points)
5. You have sensitive personal data posted online (e.g.,
a blog or social media) (10 points) 16
6. You do not shred or tear banking and credit
information when you throw it in the trash (10 points)
7. You provide your Social Security number (SSN)
whenever asked (20 points)
– Add 5 points if you provide it orally without checking
to see who might be listening
8. You are required to use your SSN as an employee
or student ID number (5 points)
9. Your SSN is printed on an employee badge that you
wear (10 points)
10. Your SSN or driver’s license number is printed on
your personal checks (20 points) 17
11. You are listed in a Who’s Who Guide (5 points)
12. You carry an insurance card in your wallet and it
contains your SSN or your spouse’s SSN (20 points)
13. You have not ordered a copy of your credit report
for at least two years (10 points)
14. You write checks with a “regular” pen instead of a
gel pen with ink that cannot be “washed” (5 points)
15. You do not believe that people would root around
in your trash looking for credit or financial information
(10 points)
18
What Your Identity Theft Risk Score
Means
• 100+ Points: You are at HIGH RISK. You should
purchase a paper shredder and become more
security aware in document handling.
• 50-100 points: Your odds of being victimized are
about average; higher if you have good credit.
• 0-50 points: Congratulations! You have a high
security IQ. Keep up the good work.
19
Question #2:
How Were Your Quiz Scores?
• 0 to 50 points? (Lower Risk)
• 50 to 100 points?
• 100+ points? (High Risk)
20
FTC Identity Theft Video #1:
How Identity Theft Happens
http://www.youtube.com/watch?v=-IEBVIh7bzc
21
FTC Identity Theft Video #2:
Case Stories of Real People
http://www.youtube.com/watch?v=OoPJImjP1ZQ
22
Who are Identity Thieves?
• Narcotics users or sellers
• Organized crime and gangs
• Opportunists
• Desperate people
• Employees (business and government)
• Family members or someone close to you
23
Types of Identity Theft
Credit card fraud Bank account fraud
Communications services fraud Health insurance fraud
Fraudulent loans Tax refund identity theft
Children’s identity theft Driver’s license fraud
…and more!
Driver’s License Identity Theft
• Your driving privileges could be
suspended or revoked
• You could be arrested during a
routine traffic stop for crimes you did
not commit
• Thieves can open bank accounts,
apply for credit, and cash checks in
your name
25
Children’s Identity Theft
http://today.msnbc.msn.com/id/42997608/ns/today-pare
26
“I owe $20,000 on
four credit cards, my
car was repossessed,
and I turn two next
month”
Criminals often use children’s identities, not for credit
fraud, but to obtain a driver’s license, commit crimes,
collect Social Security, and obtain medical treatment
27
27
Medical Identity Theft Video
http://www.youtube.com/watch?v=EePx7STsnOI
28
How Identity Theft Occurs
Identity thieves…
• steal wallets and purses containing your ID
• steal your mail
• rummage through trash (“dumpster diving”)
• pose fraudulently as someone else to get your
information (“pretexting”)
• steal data with skimming devices
29
Skimming is stealing credit /debit card numbers with a
device that reads and decodes information from the
magnetic strip on the back of credit or debit cards
Skimming Machines
30
More Identity Theft Methods
Identity thieves…
• steal business or personnel records at your
workplace
• find personal info in your home
• use info you put on the Internet
• buy personal info from “inside sources”
• “shoulder surf” at ATMs and telephones
31
How Identity Thieves
Use Stolen Information
• Open new credit card accounts
• Establish phone or wireless service
• Open new bank accounts and write bad checks
• Counterfeit checks or debit cards
• Buy cars and take out car loans
• Get fraudulent income tax refunds
• Get medical care in a victim’s name
….and more!
32
Reducing Identity Theft Risk
• Destroy credit card applications, receipts, bank, and
billing statements
• Avoid giving your SSN unless it’s absolutely
necessary -- use other identifiers
• Pay attention to billing cycles
• Guard your mail from theft
• Put passwords on smart phones
• Don’t let your credit card out of your sight
33
More Ways to Reduce
Identity Theft Risk
• Carry as little identification info as possible
• Limit the number of credit cards you carry
• Don’t give personal identification info on the
phone unless you initiate the call
• Be cautious with personal info in your home
• Check who has access to personal info at work
• Clean out your car
34
Still More Ways to
Reduce Identity Theft Risk
• Don’t carry your SS card
• Save ATM and credit card receipts to check
against statements
• Alert family members to dangers of pretexting
• Make sure your credit reports are accurate
• Write checks with uniball gel pens
35
Question #3:
Can You Suggest Any Other Identity
Theft Risk Reduction Strategies?
36
Technology Scams:
Phishing,
Fraudulent E-mails, etc.
37
37
Look-Alike (Fake) Web Sites
• Spoof e-mail messages sent to “verify” or
“update” account info
• Appears to come from reputable company
– Example: eBay, Best Buy, banks, merchants
• Looks “legitimate”
• Scam is called “phishing”
– Get people to disclose sensitive data
– Data used to commit identity theft
38
Red Flags of a Phishing Scam
• E-mails that direct users to a Web site to
“validate” or “update” info
• Threats that accounts will be closed
• Grammatical errors and typos
• Lack of a specific contact person, phone
number, or address
• Words Like “Urgent” and “Immediately”
39
Phishing Video: Symantic Guide to
Scary Internet Stuff
http://www.youtube.com/watch?v=K8lWLwuiDwk
40
Steps To Avoid Phishing
• Be cautious: African refugees with $10 million,
suspended FDIC insurance, etc.
• Realize that banks never ask for account info,
especially in an e-mail
• Ditto for the IRS
• Don’t click on any links in suspicious e-mails
• Report suspicious e-mails to companies and
spam@uce.gov
• D-E-L-E-T-E 41
Phishing Sample #1
After the last annual calculations of your fiscal activity
we have determined that you are eligible to receive a
tax refund of $92.50. Please submit the tax refund
request and allow us 3-6 days in order to process it. A
refund can be delayed for a variety of reasons. For
example submitting invalid records or applying after the
deadline.
To access the form for your tax refund, please click:
http://easy-classifieds.com/Internal/Revenue/service/verify.
Regards, Internal Revenue Service 42
Phishing Sample #2
ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he
died with his entire family leaving behind no next of kin,am ready to share
70/30 with you if you choose to stand as my deceased client next of kin.
Pls indicate by sending the following below to show your interest. 1.YOUR
NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR
PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7. ANY
FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT
Your response with the requested information should be sent to reach me at
my personal email address below: yi.simon19@gmail.com
Yours Truly, Simon Yi
43
Phishing Sample #3
Attention: Beneficiary I wish to use this medium and my office to inform you
that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only
from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED
for onward transfer to you via ATM CARD which you will use in withdrawing
your funds in any ATM SERVICE MACHINE in any part of the world, but the
maximum you can withdraw in a day is USD$10,000 Only.
The United States government has mandated the CENTRAL BANK OF
NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are
advised to contact the Head of ATM CARD Department of the CENTRAL
BANK OF NIGERIA for further instructions on how to dispatch your ATM
CARD to you.
Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN
Email: lap111@blumail.org
44
Spear Phishing
• Instead of casting out thousands of random e-mails,
spear phishers target victims more personally
– May have stolen ID info
– People that attend the same college OR use the
same bank OR work for same employer, etc.
• E-mails to victims are more “personal,” which makes
them dangerous and deceptive
45
Question #4:
Do You Have Any Good
Examples of Phishing
Schemes?
46
Rutgers Cooperative Extension
Online Identity Theft Quiz
www.rce.rutgers.edu/money/identitytheft/default.asp
The online quiz provides both
personalized feedback to users and
a database for ongoing research
47
2014 Study Findings
• The higher the score, the more frequently identity theft risk
reduction practices are performed. The mean quiz score
was 73.58 out of 100. Mean scores for individual quiz items
ranged from 2.50 to 4.48 (1= Never, 5 = Always)
• Two areas of weakness were checking one’s credit report
annually (2.65) and securing incoming mail (2.50).
• Almost two-thirds (64.4%) of respondents scored between 70
and 100. The three risk reduction strategies that were
performed most frequently (mean score above 4) were not
divulging one’s SSN, not printing sensitive data on
checks, and practicing “general security consciousness”
48
Identity Theft Actions
Proactive
•Monitoring annual credit
reports
•Free credit scores
•Risk reduction strategies
•Opt out of prescreened credit
offers:
http://www.consumer.ftc.gov/articles/0262-stopping-unsolicited-ma
Reactive
•Fraud alert
•Credit freeze
•FTC affidavit
•File police report
•Notify creditors
•Change account numbers
•Change passwords
49
Key Follow-Up Actions
Fraud Alert
A fraud alert notifies lenders
to take precautions to check
your identity before extending
credit
Credit agency has to call you
to confirm ant request it
receives to open an account
in your name
Credit Freeze
A credit freeze is a more
serious step. It denies lenders
and others (except those you
already have a relationship
with) access to your credit
report so they can’t extend
credit
Keeps everyone- including
YOU- from applying for
additional credit
50
Identity Theft Resources
• Reporting Identity Theft (FINRA):
http://www.saveandinvest.org/protect-your-money-report-fraud/r
• Identity Theft Affidavit (FTC):
http://www.consumer.ftc.gov/articles/pdf-0094-identity-theft-affid
• Identity Theft IQ Test (Privacy Rights Clearinghouse):
https://www.privacyrights.org/itrc-quiz1.htm
• Identity Theft and Your Social Security Number (Social
Security Administration):
https://www.ssa.gov/pubs/EN-05-10064.pdf
51
New Resource: IdentityTheft.gov
52
Tax, medical & child identity theft
and imposter scams
Carol Kando-Pineda
Federal Trade Commission
53
Tax Identity Theft
• Using someone else’s Social Security
number to file a fraudulent tax return
(or a deceased taxpayer’s information to get their
refund)
•Claiming someone else’s children as
dependents
54
Warning Signs
• Social Security number is lost, stolen, or
compromised
• Unusual delay in getting a refund
• IRS notification:
– duplicate tax return filing
– unreported income
55
Immediate Steps for Victims
• Contact the IRS Identity Protection Specialized Unit at
800-908-4490 (8 a.m. to 8 p.m., local time)
• File IRS Identity Theft Affidavit (Form 14039)
• Have valid govt-issued identification
– Social Security card, driver’s license, or passport)
• When resolved, you’ll get an Identity Verification PIN
• Go to: irs.gov/identitytheft
56
Step 1: Call the companies where you
know fraud occurred
Call the fraud department
Explain that someone stole your
identity
Immediate Steps for Victims
57
Step 2: Place a fraud alert and get your
credit report
www.annualcreditreport.com or 1-877-322-8228.
Immediate Steps for Victims
58
Step 3: Report identity theft to the FTC
Complete the online form or call 1-877-438-
4338. Include as many details as possible
Immediate Steps for Victims
59
Step 4: File a report with your local police
department
Bring ID with photo, proof of address
Immediate Steps for Victims
60
61
Identity Theft Report
62
Preparing and Filing Tax Returns
• Know your tax preparer
• Mail tax returns as early in the tax season
as possible
63
Preparing and Filing Tax Returns
• Keep them safe:
–Not in outgoing mail
–Secure network to transmit
–Lock up copies
–Shred, shred, shred
64
Preparing and Filing Tax Returns
• Minimize personal information in purses
or wallets, or on smartphones
• Do not respond to unsolicited emails and
calls that appear to be from the IRS
65
Medical Identity Theft
• Read every “Explanation of Benefits” statement you
get from your health insurer
• Follow up on any item you don’t recognize
• Check your benefits
66
Medical Identity Theft
• Contact each doctor… or clinic, hospital, pharmacy,
laboratory, and health plan where the thief may have used
your information
• Get your records. Complete the providers’ records request
forms and pay any fees required to get copies of your records
• Check your state’s health privacy laws. Some state laws make
it easier to get copies of your medical records
67
Medical Identity Theft
• Review your medical records, and report any errors to your
health care provider
• Write to your health care provider to report mistakes in your
medical records
• Notify your health insurer
– Send your Identity Theft Report to your health insurer’s
fraud department
– Tell them about any errors in your medical records
68
Child Identity Theft
• Follow the usual steps for What To Do Right Away
and What To Do Next with 2 exceptions:
• Ask (phone or email) for a search based only on
your child’s Social Security number (SSN)
– Equifax
1-800-525-6285
– Experian
1-888-397-3742
– TransUnion.com
childidtheft@transunion.com
69
Child Identity Theft
• Send each credit reporting agency the Minor’s Status
Declaration [PDF] form
– It’s proof that your child is a minor
– Include a letter asking that all information associated with
your child’s name or SSN to be removed
70
71
72
73
74
75
76
77
78
Imposter Scams
• On the rise
• Many variations on the hook….
79
Imposter complaints to FTC have skyrocketed
CY2013 126,000
CY2015 350,000
IRS complaints alone are up to 228,000
(from 64,000 in CY 2013)
Imposter Scams
80
The Great Pretenders
• The stories change but the ending is
always the same…
–IRS and Other government imposters
–Online romance
–Family emergency
–Business/Tech support
81
• Scammers posing as the IRS call and say you owe
taxes
• They might also:
– know all or part of your SSN
– rig caller ID to make it look like call is from DC (202 area
code)
Imposter Scams
82
Imposter Scams
• Imposters might:
– threaten arrest or deportation
– demand immediate payment
• pre-paid debit card or wire transfer
– send you bogus IRS emails to further the scheme
83
What you need to know
• The IRS will not:
– ask you to pay with prepaid debit cards or wire
transfers
– ask for a credit card number over the phone
– threaten arrest, deportation or loss of your
drivers license
– send you emails without prior contact
84
What you need to know
• If the IRS needs to contact you,
– they will first do it by mail
• If you have any doubts,
– call the IRS directly at 800-829-1040
85
Military Consumer
Military.ncpw.gov
•July is month of the Military Consumer
•New toolkit coming soon
86
Questions?
Thank you!
87
Resources
IdentityTheft.gov
Consumer.FTC.gov
All our articles, videos, posts
Consumer.gov
Just the basics
FTC.gov/bulkorder
order any print materials for FREE!
88
What is one significant thing you
learned today?
89
Key Takeaways
• Identity theft uses “no tech” and high tech methods
• Minimize the amount of information that can be
stolen from you
• You cannot control every identity theft risk factor
• Identity theft is a crime that should be reported
• Act immediately to stop further use of your identity
90
Evaluation and Continuing Education
Credits/Certificate of Completion
MFLN Personal Finance is offering 1.5 credit
hours for AFC-credentialed participants through
AFCPE and CPFCs through FinCert.
To receive a certificate of completion, please
complete the evaluation and post-test at:
https://vte.co1.qualtrics.com/SE/?
SID=SV_2aYT6lxWbYLzI2x
Must pass post-test with an 80% or higher to
receive certificate.
91
Personal Finance Upcoming Event
Life Insurance Basics for Military Families
• Date: April 5, 2016
• Time: 11 a.m.-12:30 p.m. Eastern
• Location:
https://learn.extension.org/events/2496
For more information on MFLN Personal Finance go to:
https://blogs.extension.org/militaryfamilies/category/per
sonal-finance/
92
www.extension.org/62581
93
93

Mais conteúdo relacionado

Mais procurados

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

Mais procurados (20)

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Identity theft
Identity theftIdentity theft
Identity theft
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 

Destaque

Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 

Destaque (13)

Lexpro Accounting Presentation
Lexpro Accounting PresentationLexpro Accounting Presentation
Lexpro Accounting Presentation
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Calculating What to Save for Retirement
Calculating What to Save for RetirementCalculating What to Save for Retirement
Calculating What to Save for Retirement
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
A Few White Sneaky Ways To Repair Your Credit History
A Few White Sneaky Ways To Repair Your Credit HistoryA Few White Sneaky Ways To Repair Your Credit History
A Few White Sneaky Ways To Repair Your Credit History
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Sample letters to remove inquiries
Sample letters to remove inquiriesSample letters to remove inquiries
Sample letters to remove inquiries
 
Credit Dispute Letters
Credit Dispute LettersCredit Dispute Letters
Credit Dispute Letters
 
Credit and Debt Dispute Letters
Credit and Debt Dispute LettersCredit and Debt Dispute Letters
Credit and Debt Dispute Letters
 
Credit repair letter
Credit repair letterCredit repair letter
Credit repair letter
 

Semelhante a Identity Theft: How to Reduce Your Risk

Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 

Semelhante a Identity Theft: How to Reduce Your Risk (20)

Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 

Mais de milfamln

Mais de milfamln (20)

Warrior Wellness: Mental Health and Women in the U.S. Military
Warrior Wellness: Mental Health and Women in the U.S. MilitaryWarrior Wellness: Mental Health and Women in the U.S. Military
Warrior Wellness: Mental Health and Women in the U.S. Military
 
Women in the Military: Special Contributions and Unique Challenges
Women in the Military: Special Contributions and Unique ChallengesWomen in the Military: Special Contributions and Unique Challenges
Women in the Military: Special Contributions and Unique Challenges
 
Focusing on Co-parenting: Strengthening Diverse Military Family Systems
Focusing on Co-parenting: Strengthening Diverse Military Family SystemsFocusing on Co-parenting: Strengthening Diverse Military Family Systems
Focusing on Co-parenting: Strengthening Diverse Military Family Systems
 
Family Systems Trends and Transitions: What They Mean For Military Families
Family Systems Trends and Transitions: What They Mean For Military FamiliesFamily Systems Trends and Transitions: What They Mean For Military Families
Family Systems Trends and Transitions: What They Mean For Military Families
 
Promoting Successful Home-to-School Transitions for Military Families with Yo...
Promoting Successful Home-to-School Transitions for Military Families with Yo...Promoting Successful Home-to-School Transitions for Military Families with Yo...
Promoting Successful Home-to-School Transitions for Military Families with Yo...
 
Home Is Where Your Heart Is | Kids Serve Too!
Home Is Where Your Heart Is | Kids Serve Too!Home Is Where Your Heart Is | Kids Serve Too!
Home Is Where Your Heart Is | Kids Serve Too!
 
PCS Series: Research and Tools for Supporting Military Transitions
PCS Series: Research and Tools for Supporting Military TransitionsPCS Series: Research and Tools for Supporting Military Transitions
PCS Series: Research and Tools for Supporting Military Transitions
 
SlideShare - Sesame Street Overview on Military Resources
SlideShare - Sesame Street Overview on Military Resources SlideShare - Sesame Street Overview on Military Resources
SlideShare - Sesame Street Overview on Military Resources
 
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...
Up and Away:  Building Child Language, Social Interactions, and Preliteracy S...Up and Away:  Building Child Language, Social Interactions, and Preliteracy S...
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...
 
Overindulgence In Parenting: How Much Is Too Much?
Overindulgence In Parenting:  How Much Is Too Much?Overindulgence In Parenting:  How Much Is Too Much?
Overindulgence In Parenting: How Much Is Too Much?
 
Employment Resources for Military Families
Employment Resources for Military FamiliesEmployment Resources for Military Families
Employment Resources for Military Families
 
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
 
Coconut Oil: Super Food or Super Fad .pdf
Coconut Oil:  Super Food or Super Fad .pdfCoconut Oil:  Super Food or Super Fad .pdf
Coconut Oil: Super Food or Super Fad .pdf
 
Small Talk: Strategies to Support Child Communication Before Words Emerge
Small Talk: Strategies to Support Child Communication Before Words EmergeSmall Talk: Strategies to Support Child Communication Before Words Emerge
Small Talk: Strategies to Support Child Communication Before Words Emerge
 
From Communication to Conversations: Expanding Language Development in the E...
From Communication to Conversations:  Expanding Language Development in the E...From Communication to Conversations:  Expanding Language Development in the E...
From Communication to Conversations: Expanding Language Development in the E...
 
Entrepreneurial Opportunities for Military Families
Entrepreneurial Opportunities for Military FamiliesEntrepreneurial Opportunities for Military Families
Entrepreneurial Opportunities for Military Families
 
Getting to Know You: Early Communication Development from Birth to Three Years
Getting to Know You: Early Communication Development from Birth to Three YearsGetting to Know You: Early Communication Development from Birth to Three Years
Getting to Know You: Early Communication Development from Birth to Three Years
 
Income Tax Tips for PFMs Working with Military Families
Income Tax Tips for PFMs Working with Military FamiliesIncome Tax Tips for PFMs Working with Military Families
Income Tax Tips for PFMs Working with Military Families
 
The Blended Retirement System Launch: Questions & Answers
The Blended Retirement System Launch: Questions & Answers The Blended Retirement System Launch: Questions & Answers
The Blended Retirement System Launch: Questions & Answers
 
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Identity Theft: How to Reduce Your Risk

  • 2. Connecting military family service providers to research and to each other through innovative online programming www.extension.org/militaryfamilies MFLN Intro Sign up for webinar email notifications at www.extension.org/62831 2
  • 3. Connecting military family service providers to research and to each other through innovative online programming MFLN Intro Join the Conversation Online! 3
  • 4. Join the Conversation Online! MFLN Personal Finance MFLN Personal Finance @MFLNPF MFLN Group https://www.linkedin.com/groups/8409844 PF SMS icons PF SMS icons Military Families Learning Network 4
  • 5. Dr. Barbara O’Neill •Financial Resource Management Specialist for Rutgers Cooperative Extension •Has been a professional, financial educator and author for more than 35 years. •Has written more than 1,500 articles for academic journals, conference proceedings & other professional publications. Today’s Presenters 5 Carol Kando-Pineda •Counsel in the FTC’s Division of Consumer & Business Education •She leads FTC teams to create and distribute free resources to help people spot, stop and avoid fraud, manage their money and make wise buys. •She began her FTC career as a staff attorney bringing false advertising claims.
  • 6. Question #1: Has Anyone (or Family Member) Been an ID Theft Victim? • Describe the situation • Who was the fraudster (if known)? • How was the case resolved? 6
  • 7. Back in the Day…. What did people do when they wanted to steal a lot of money? 7
  • 8. Some Famous Bank Robbers in U.S. History • Bonnie and Clyde • John Dillinger • Willie Sutton 8
  • 9. Today Most Financial Theft Is Done Through Identity Theft • A major white-collar crime: https://www.fbi.gov/about-us/investigate/white_collar • Thief may not know victim • No need to use physical violence • Less risk of being caught • Technology and carelessness with data help thieves 9
  • 10. What Is Identity Theft?  Fraud committed via the stealing and unlawful use of key pieces of personal identification information (PII)  In other words, when bad things happen to someone’s good name. 10
  • 11. Identity Theft Is in the News! 11
  • 12. What Personal Information Is Stolen by Identity Thieves? 12
  • 13. Sources of Personal Information 1313
  • 14. Signs of Identity Theft • Items in your credit report that aren’t yours • Calls or letters from creditors, medical providers, or law enforcement • Negative notification at a critical point in life – Buying a home or car – Applying for a job • Zero balances in bank accounts • When a child starts getting credit offers or debt calls • Delay in processing an income tax refund • Other? 14
  • 15. Are YOU at Risk For Identity Theft? Take this 15-question quiz adapted from Experian to find out The lower your score, the better 15
  • 16. 1. You receive offers of pre-approved credit and, if you decide not to accept them, you do not shred them (10 points) 2. You carry your Social Security card (or other document with your SS number on it) in your wallet (10 points) 3. You do not have a post office box or a locked, secured mailbox (5 points) 4. You drop off your outgoing mail at an open, unlocked box or basket (10 points) 5. You have sensitive personal data posted online (e.g., a blog or social media) (10 points) 16
  • 17. 6. You do not shred or tear banking and credit information when you throw it in the trash (10 points) 7. You provide your Social Security number (SSN) whenever asked (20 points) – Add 5 points if you provide it orally without checking to see who might be listening 8. You are required to use your SSN as an employee or student ID number (5 points) 9. Your SSN is printed on an employee badge that you wear (10 points) 10. Your SSN or driver’s license number is printed on your personal checks (20 points) 17
  • 18. 11. You are listed in a Who’s Who Guide (5 points) 12. You carry an insurance card in your wallet and it contains your SSN or your spouse’s SSN (20 points) 13. You have not ordered a copy of your credit report for at least two years (10 points) 14. You write checks with a “regular” pen instead of a gel pen with ink that cannot be “washed” (5 points) 15. You do not believe that people would root around in your trash looking for credit or financial information (10 points) 18
  • 19. What Your Identity Theft Risk Score Means • 100+ Points: You are at HIGH RISK. You should purchase a paper shredder and become more security aware in document handling. • 50-100 points: Your odds of being victimized are about average; higher if you have good credit. • 0-50 points: Congratulations! You have a high security IQ. Keep up the good work. 19
  • 20. Question #2: How Were Your Quiz Scores? • 0 to 50 points? (Lower Risk) • 50 to 100 points? • 100+ points? (High Risk) 20
  • 21. FTC Identity Theft Video #1: How Identity Theft Happens http://www.youtube.com/watch?v=-IEBVIh7bzc 21
  • 22. FTC Identity Theft Video #2: Case Stories of Real People http://www.youtube.com/watch?v=OoPJImjP1ZQ 22
  • 23. Who are Identity Thieves? • Narcotics users or sellers • Organized crime and gangs • Opportunists • Desperate people • Employees (business and government) • Family members or someone close to you 23
  • 24. Types of Identity Theft Credit card fraud Bank account fraud Communications services fraud Health insurance fraud Fraudulent loans Tax refund identity theft Children’s identity theft Driver’s license fraud …and more!
  • 25. Driver’s License Identity Theft • Your driving privileges could be suspended or revoked • You could be arrested during a routine traffic stop for crimes you did not commit • Thieves can open bank accounts, apply for credit, and cash checks in your name 25
  • 27. “I owe $20,000 on four credit cards, my car was repossessed, and I turn two next month” Criminals often use children’s identities, not for credit fraud, but to obtain a driver’s license, commit crimes, collect Social Security, and obtain medical treatment 27 27
  • 28. Medical Identity Theft Video http://www.youtube.com/watch?v=EePx7STsnOI 28
  • 29. How Identity Theft Occurs Identity thieves… • steal wallets and purses containing your ID • steal your mail • rummage through trash (“dumpster diving”) • pose fraudulently as someone else to get your information (“pretexting”) • steal data with skimming devices 29
  • 30. Skimming is stealing credit /debit card numbers with a device that reads and decodes information from the magnetic strip on the back of credit or debit cards Skimming Machines 30
  • 31. More Identity Theft Methods Identity thieves… • steal business or personnel records at your workplace • find personal info in your home • use info you put on the Internet • buy personal info from “inside sources” • “shoulder surf” at ATMs and telephones 31
  • 32. How Identity Thieves Use Stolen Information • Open new credit card accounts • Establish phone or wireless service • Open new bank accounts and write bad checks • Counterfeit checks or debit cards • Buy cars and take out car loans • Get fraudulent income tax refunds • Get medical care in a victim’s name ….and more! 32
  • 33. Reducing Identity Theft Risk • Destroy credit card applications, receipts, bank, and billing statements • Avoid giving your SSN unless it’s absolutely necessary -- use other identifiers • Pay attention to billing cycles • Guard your mail from theft • Put passwords on smart phones • Don’t let your credit card out of your sight 33
  • 34. More Ways to Reduce Identity Theft Risk • Carry as little identification info as possible • Limit the number of credit cards you carry • Don’t give personal identification info on the phone unless you initiate the call • Be cautious with personal info in your home • Check who has access to personal info at work • Clean out your car 34
  • 35. Still More Ways to Reduce Identity Theft Risk • Don’t carry your SS card • Save ATM and credit card receipts to check against statements • Alert family members to dangers of pretexting • Make sure your credit reports are accurate • Write checks with uniball gel pens 35
  • 36. Question #3: Can You Suggest Any Other Identity Theft Risk Reduction Strategies? 36
  • 38. Look-Alike (Fake) Web Sites • Spoof e-mail messages sent to “verify” or “update” account info • Appears to come from reputable company – Example: eBay, Best Buy, banks, merchants • Looks “legitimate” • Scam is called “phishing” – Get people to disclose sensitive data – Data used to commit identity theft 38
  • 39. Red Flags of a Phishing Scam • E-mails that direct users to a Web site to “validate” or “update” info • Threats that accounts will be closed • Grammatical errors and typos • Lack of a specific contact person, phone number, or address • Words Like “Urgent” and “Immediately” 39
  • 40. Phishing Video: Symantic Guide to Scary Internet Stuff http://www.youtube.com/watch?v=K8lWLwuiDwk 40
  • 41. Steps To Avoid Phishing • Be cautious: African refugees with $10 million, suspended FDIC insurance, etc. • Realize that banks never ask for account info, especially in an e-mail • Ditto for the IRS • Don’t click on any links in suspicious e-mails • Report suspicious e-mails to companies and spam@uce.gov • D-E-L-E-T-E 41
  • 42. Phishing Sample #1 After the last annual calculations of your fiscal activity we have determined that you are eligible to receive a tax refund of $92.50. Please submit the tax refund request and allow us 3-6 days in order to process it. A refund can be delayed for a variety of reasons. For example submitting invalid records or applying after the deadline. To access the form for your tax refund, please click: http://easy-classifieds.com/Internal/Revenue/service/verify. Regards, Internal Revenue Service 42
  • 43. Phishing Sample #2 ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he died with his entire family leaving behind no next of kin,am ready to share 70/30 with you if you choose to stand as my deceased client next of kin. Pls indicate by sending the following below to show your interest. 1.YOUR NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7. ANY FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT Your response with the requested information should be sent to reach me at my personal email address below: yi.simon19@gmail.com Yours Truly, Simon Yi 43
  • 44. Phishing Sample #3 Attention: Beneficiary I wish to use this medium and my office to inform you that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED for onward transfer to you via ATM CARD which you will use in withdrawing your funds in any ATM SERVICE MACHINE in any part of the world, but the maximum you can withdraw in a day is USD$10,000 Only. The United States government has mandated the CENTRAL BANK OF NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are advised to contact the Head of ATM CARD Department of the CENTRAL BANK OF NIGERIA for further instructions on how to dispatch your ATM CARD to you. Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN Email: lap111@blumail.org 44
  • 45. Spear Phishing • Instead of casting out thousands of random e-mails, spear phishers target victims more personally – May have stolen ID info – People that attend the same college OR use the same bank OR work for same employer, etc. • E-mails to victims are more “personal,” which makes them dangerous and deceptive 45
  • 46. Question #4: Do You Have Any Good Examples of Phishing Schemes? 46
  • 47. Rutgers Cooperative Extension Online Identity Theft Quiz www.rce.rutgers.edu/money/identitytheft/default.asp The online quiz provides both personalized feedback to users and a database for ongoing research 47
  • 48. 2014 Study Findings • The higher the score, the more frequently identity theft risk reduction practices are performed. The mean quiz score was 73.58 out of 100. Mean scores for individual quiz items ranged from 2.50 to 4.48 (1= Never, 5 = Always) • Two areas of weakness were checking one’s credit report annually (2.65) and securing incoming mail (2.50). • Almost two-thirds (64.4%) of respondents scored between 70 and 100. The three risk reduction strategies that were performed most frequently (mean score above 4) were not divulging one’s SSN, not printing sensitive data on checks, and practicing “general security consciousness” 48
  • 49. Identity Theft Actions Proactive •Monitoring annual credit reports •Free credit scores •Risk reduction strategies •Opt out of prescreened credit offers: http://www.consumer.ftc.gov/articles/0262-stopping-unsolicited-ma Reactive •Fraud alert •Credit freeze •FTC affidavit •File police report •Notify creditors •Change account numbers •Change passwords 49
  • 50. Key Follow-Up Actions Fraud Alert A fraud alert notifies lenders to take precautions to check your identity before extending credit Credit agency has to call you to confirm ant request it receives to open an account in your name Credit Freeze A credit freeze is a more serious step. It denies lenders and others (except those you already have a relationship with) access to your credit report so they can’t extend credit Keeps everyone- including YOU- from applying for additional credit 50
  • 51. Identity Theft Resources • Reporting Identity Theft (FINRA): http://www.saveandinvest.org/protect-your-money-report-fraud/r • Identity Theft Affidavit (FTC): http://www.consumer.ftc.gov/articles/pdf-0094-identity-theft-affid • Identity Theft IQ Test (Privacy Rights Clearinghouse): https://www.privacyrights.org/itrc-quiz1.htm • Identity Theft and Your Social Security Number (Social Security Administration): https://www.ssa.gov/pubs/EN-05-10064.pdf 51
  • 53. Tax, medical & child identity theft and imposter scams Carol Kando-Pineda Federal Trade Commission 53
  • 54. Tax Identity Theft • Using someone else’s Social Security number to file a fraudulent tax return (or a deceased taxpayer’s information to get their refund) •Claiming someone else’s children as dependents 54
  • 55. Warning Signs • Social Security number is lost, stolen, or compromised • Unusual delay in getting a refund • IRS notification: – duplicate tax return filing – unreported income 55
  • 56. Immediate Steps for Victims • Contact the IRS Identity Protection Specialized Unit at 800-908-4490 (8 a.m. to 8 p.m., local time) • File IRS Identity Theft Affidavit (Form 14039) • Have valid govt-issued identification – Social Security card, driver’s license, or passport) • When resolved, you’ll get an Identity Verification PIN • Go to: irs.gov/identitytheft 56
  • 57. Step 1: Call the companies where you know fraud occurred Call the fraud department Explain that someone stole your identity Immediate Steps for Victims 57
  • 58. Step 2: Place a fraud alert and get your credit report www.annualcreditreport.com or 1-877-322-8228. Immediate Steps for Victims 58
  • 59. Step 3: Report identity theft to the FTC Complete the online form or call 1-877-438- 4338. Include as many details as possible Immediate Steps for Victims 59
  • 60. Step 4: File a report with your local police department Bring ID with photo, proof of address Immediate Steps for Victims 60
  • 61. 61
  • 63. Preparing and Filing Tax Returns • Know your tax preparer • Mail tax returns as early in the tax season as possible 63
  • 64. Preparing and Filing Tax Returns • Keep them safe: –Not in outgoing mail –Secure network to transmit –Lock up copies –Shred, shred, shred 64
  • 65. Preparing and Filing Tax Returns • Minimize personal information in purses or wallets, or on smartphones • Do not respond to unsolicited emails and calls that appear to be from the IRS 65
  • 66. Medical Identity Theft • Read every “Explanation of Benefits” statement you get from your health insurer • Follow up on any item you don’t recognize • Check your benefits 66
  • 67. Medical Identity Theft • Contact each doctor… or clinic, hospital, pharmacy, laboratory, and health plan where the thief may have used your information • Get your records. Complete the providers’ records request forms and pay any fees required to get copies of your records • Check your state’s health privacy laws. Some state laws make it easier to get copies of your medical records 67
  • 68. Medical Identity Theft • Review your medical records, and report any errors to your health care provider • Write to your health care provider to report mistakes in your medical records • Notify your health insurer – Send your Identity Theft Report to your health insurer’s fraud department – Tell them about any errors in your medical records 68
  • 69. Child Identity Theft • Follow the usual steps for What To Do Right Away and What To Do Next with 2 exceptions: • Ask (phone or email) for a search based only on your child’s Social Security number (SSN) – Equifax 1-800-525-6285 – Experian 1-888-397-3742 – TransUnion.com childidtheft@transunion.com 69
  • 70. Child Identity Theft • Send each credit reporting agency the Minor’s Status Declaration [PDF] form – It’s proof that your child is a minor – Include a letter asking that all information associated with your child’s name or SSN to be removed 70
  • 71. 71
  • 72. 72
  • 73. 73
  • 74. 74
  • 75. 75
  • 76. 76
  • 77. 77
  • 78. 78
  • 79. Imposter Scams • On the rise • Many variations on the hook…. 79
  • 80. Imposter complaints to FTC have skyrocketed CY2013 126,000 CY2015 350,000 IRS complaints alone are up to 228,000 (from 64,000 in CY 2013) Imposter Scams 80
  • 81. The Great Pretenders • The stories change but the ending is always the same… –IRS and Other government imposters –Online romance –Family emergency –Business/Tech support 81
  • 82. • Scammers posing as the IRS call and say you owe taxes • They might also: – know all or part of your SSN – rig caller ID to make it look like call is from DC (202 area code) Imposter Scams 82
  • 83. Imposter Scams • Imposters might: – threaten arrest or deportation – demand immediate payment • pre-paid debit card or wire transfer – send you bogus IRS emails to further the scheme 83
  • 84. What you need to know • The IRS will not: – ask you to pay with prepaid debit cards or wire transfers – ask for a credit card number over the phone – threaten arrest, deportation or loss of your drivers license – send you emails without prior contact 84
  • 85. What you need to know • If the IRS needs to contact you, – they will first do it by mail • If you have any doubts, – call the IRS directly at 800-829-1040 85
  • 86. Military Consumer Military.ncpw.gov •July is month of the Military Consumer •New toolkit coming soon 86
  • 88. Resources IdentityTheft.gov Consumer.FTC.gov All our articles, videos, posts Consumer.gov Just the basics FTC.gov/bulkorder order any print materials for FREE! 88
  • 89. What is one significant thing you learned today? 89
  • 90. Key Takeaways • Identity theft uses “no tech” and high tech methods • Minimize the amount of information that can be stolen from you • You cannot control every identity theft risk factor • Identity theft is a crime that should be reported • Act immediately to stop further use of your identity 90
  • 91. Evaluation and Continuing Education Credits/Certificate of Completion MFLN Personal Finance is offering 1.5 credit hours for AFC-credentialed participants through AFCPE and CPFCs through FinCert. To receive a certificate of completion, please complete the evaluation and post-test at: https://vte.co1.qualtrics.com/SE/? SID=SV_2aYT6lxWbYLzI2x Must pass post-test with an 80% or higher to receive certificate. 91
  • 92. Personal Finance Upcoming Event Life Insurance Basics for Military Families • Date: April 5, 2016 • Time: 11 a.m.-12:30 p.m. Eastern • Location: https://learn.extension.org/events/2496 For more information on MFLN Personal Finance go to: https://blogs.extension.org/militaryfamilies/category/per sonal-finance/ 92

Notas do Editor

  1. Identity theft happens when someone steals your personal identifying information in order to open new charge accounts, order merchandise, or borrow money. Review list of identifying information in the slide. A person targeted by an identity thief usually doesn’t know he or she has been victimized until the thief fails to pay the bills or repay the loans, and collection agencies begin hounding the person (whose identity has been stolen) for payment of accounts that he/she didn’t even know he had. Other fraudulent activities that identity thieves perpetrate are: taking over the victim’s financial accounts, opening new bank accounts, applying for Social Security benefits, renting apartments, and establishing services with utility and phone companies.
  2. Some people say take my credit, or that I am good at protecting my information, BUT WHAT ABOUT EVERYONE ELSE are they protecting your information. Unlike the drug trade one transaction one product, with your information it can be sold over and over again Pill bottle
  3. There is no accurate profile for an identity thief. This is their job They love the challenge, adrenaline rush and money Most people recognize that there is much less risk in identity theft than most common crimes, and a relatively high return on the time invested. Of those who know how they were victimized, more than half of the criminals were family members, or other close acquaintances.
  4. Despite your best efforts to take precautions with accessibility to your personal information or to keep it private, skilled fraudsters may use a variety of methods -- low- and high-tech -- to gain access to your data and your life. According to the FTC, this is how identity thieves get your personal information: They steal wallets and purses containing your identification and credit cards, and ATM cards. They steal mail from your mailbox, including your bank and credit card statements, bills from retail stores, pre-approved credit offers, telephone calling cards, as well as tax information. They fill out a “change of address forms” to divert your mail to another location. They rummage through garbage cans or the refuse of businesses for personal data that has been discarded in a practice known as “dumpster diving.” They commit fraud to obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for and legal right to -- the information.
  5. Your information is than downloaded to a computer using the device obtaining your name and expiration date. Also, blank cards can be bought and using a credit card encoder can put your credit card info into the blank card making available for the criminal to use it.
  6. Here are several more ways you can have your identity stolen by fraudsters: They get your business or personnel records at work. This is usually an “inside job,” done sometimes by a disgruntled employee. They find personal information in your home -- perhaps they are sharing an apartment with you. They use personal information you share on the Internet. Web sites, particularly e-commerce sites, collect a lot of data from visitors. If you buy a book or a CD at a bookstore and pay cash, there will be no record linking you to the purchase. But the books, magazines, music, and movies you buy online are all linked to you by name. Web retailers are collecting a sizable database of information on individual purchases (e.g., who’s buying certain prescription drugs or books). E-commerce sites routinely share your information, or sell it. If an e-commerce site you bought from goes bankrupt, it could be legally required to sell your data to the highest bidder as a company asset. Also, sites routinely sell or exchange your personal information. Privacy advocates are seeking federal legislation requiring Web sites to let users “opt out” of sharing data, as has recently happened in financial services. Sometimes identity thieves buy your personal information from “inside” sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit. Identity thieves also do some of their best work just by looking over your shoulder (a.k.a., “shoulder surfing”) as you dial your telephone calling card number or punch in your account number or PIN at an automated teller machine (ATM). To avoid having account data stolen in this manner, shield the key pads with your hand whenever you use a public phone or ATM.
  7. Once identity thieves have secured a piece of your personal identification, it is relatively easy to use it to wreak havoc on your life. They may use it for a number of illegal activities such as: Calling your credit card issuer and pretending to be you. They then ask to change the mailing address on your credit card account. Next, they run up charges on your account. Because your bills are being sent to the new address, it make take some time before you realize there’s a problem. Opening a new credit card account using your name, date of birth, and Social Security number. When they use the credit card and don’t pay the bills, the account now in default is reported on your credit report. Establishing phone, cable, or wireless service in your name. Again, these bills go unpaid until service providers contact the victim looking for payment. Opening a bank checking account in your name and writing bad checks on it. Filing for bankruptcy under your name to avoid paying debts they’ve run up under your name, or to avoid eviction from their apartment. Counterfeiting checks or debit cards, and draining your bank account. Getting access to a PIN number and draining your retirement account. Buying cars by taking out auto loans in your name. Buying other big ticket items and charging them on store accounts, then never making a payment.
  8. The Federal Trade Commission acknowledges that, while you probably can’t prevent identity theft entirely, you can lessen your risk. By managing your personal information wisely, cautiously, and with an awareness of the dangers, you can help protect against identity theft. Here are the best ways to minimize your risk: Store items with personal information in a safe place. To foil an identity thief who may pick through your trash to retrieve personal information, tear up charge receipts, copies of credit applications, insurance forms, physicians’ statements, and bank checks and statements that you are discarding, as well as expired charge cards and credit offers you get in the mail. Better still, purchase an inexpensive shredder. Give your Social Security number (SSN) only when absolutely necessary. Ask to use other types of identifiers when possible. Pay attention to your billing cycles. Call your creditors if your bills don’t arrive on time. A missing credit card bill could mean a fraudster has taken over your credit card account and changed your billing address to cover his tracks. Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office. Don’t leave mail unattended at your residence mail box to be picked up. Promptly remove mail from your mailbox after is has been delivered. If you’re planning to be away from home and can’t pick up your mail, call your local post office to request a vacation hold. The Postal Service will hold your mail at your local post office until you can pick it up. Ask to establish passwords on your credit card, bank and phone accounts. Avoid using easily available information like your mother’s maiden name, your birth date or your spouse’s, the last four digits of your SSN or your phone number, or a series of consecutive numbers, like 1, 2, 3, 4.
  9. Here are some additional identity theft precautions: Carry as little identification information and as few credit cards on your person as possible. Carry only what you’ll actually need and leave the rest at home. Do not give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact or know who you’re dealing with. Identity thieves often pose as representatives of banks, Internet service providers, and even government agencies, to persuade you to reveal your Social Security number, financial account number, and other identifying information. Legitimate organizations with whom you do business already have the information they need and will not ask you for it. Be cautious about where you leave personal information in your home, especially if you share an apartment with roommates, employ housekeeping or outside help, or are having service work done in your home. Be aware of who has access to your personal information at work and verify that the records are kept in a secure location. This is particularly important if you are in a position where you may have dealings with disgruntled employees.
  10. Here are several more ways to protect your personal information: Don’t carry your SSN card in your wallet; leave it in a secure place at home. Save your ATM and credit card receipts to check against your bank and credit statements. Review them carefully and promptly. Alert family members to the dangers of pretexting. Tell them that only you, or someone you authorize, should provide personal information to others. Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask for their specific policies about sharing information. Can you choose to have it kept confidential? Order a copy of your credit report from each of the three major credit reporting agencies every year. Make sure that it’s accurate and includes only those accounts and credit transactions that you’ve authorized. One credit report per year is free from each of the major credit bureaus for New Jersey residents. A credit file request form is available on the Rutgers Cooperative Extension MONEY 2000 Web site at www.rce.rutgers.edu/money2000.
  11. How does tax IDT happen? The usual ways -- Lost or stolen wallets, Medicare cards, smartphones Theft family, friends, visitors, advisors dumpster diving mail or tax returns   Unsolicited calls asking for personal information Buying information from corrupt insiders or volunteers at: banks, debt collectors hospitals, clinics, medical offices, nursing homes prisons schools, government offices tax preparation services
  12. STEP 1 – Call the Companies - Ask them to close or freeze the accounts. Then, no one can add new charges unless you agree. - Change logins, passwords and PINS for your accounts. You might have to contact them again once you have your Identity Theft Report
  13. STEP 2 – Fraud Alert You’ll get a letter from each credit bureau -- confirms that they placed a fraud alert on your file. Get your free credit report right away. Go to annualcreditreport.com or call 1-877-322-8228 Did you already order your free annual reports this year? you can pay to get your report immediately. Or follow the instructions in each fraud alert confirmation letter to get a free report, but it might take longer.
  14. STEP 3 – Report to FTC create an account, we'll walk you through each recovery step, update your plan as needed, track your progress, and pre-fill forms and letters for you. If you don't create an account, you must print and save your Identity Theft Affidavit and recovery plan right away. Once you leave the page, you won't be able to access or update them.
  15. STEP 4 – Police Go to your local police office with: - a copy of your FTC Identity Theft Affidavit a government-issued ID with a photo - proof of your address (mortgage statement, rental agreement, or utilities bill) any other proof you have of the theft (bills, IRS notices, etc.) Ask for a copy of the police report (you’ll need this for other steps)
  16. Trouble getting the police report – try bringing this memo with you: FTC's Memo to Law Enforcement [PDF]
  17. The Identity Theft Report guarantees certain rights – like getting fraudulent info off your credit report, get the extended fraud alert
  18. Do not put tax returns in outgoing mail; mail tax returns directly from post office If filing electronically, use a secure network and encrypt Store copies of your returns in a secure place Shred drafts, calculation sheets, and extra copies
  19. At least once a year, ask the health insurers you’ve been involved with for a list of the benefits they paid in your name.
  20. Did your provider refuse to give you copies of the records to protect the identity thief’s privacy rights? You can appeal. Contact the person listed in your provider’s Notice of Privacy Practices, the patient representative, or the ombudsman. Explain the situation and ask for your file. If the provider refuses to provide your records within 30 days of your written request, - you may complain to the U.S. Department of Health and Human Services Office for Civil Rights.
  21. Include a copy of the medical record showing the mistake. Explain why this is a mistake, and how to correct it. Include a copy of your Identity Theft Report. Send the letter by certified mail, and ask for a return receipt. health care provider should respond to your letter within 30 days. Ask the provider to: fix the mistake and notify other health care providers who may have the same mistake in their records. medical billing errors on your credit report, - notify all 3 credit reporting companies. Write down who you contacted and when. - Keep copies of any letters you send.  
  22.  
  23. Largest telephone scam in TIGTA’s history 800,000+ contacts across the US Over $14M paid to scammers Top 5 states* affected (by dollar loss): - California - Florida - New York - Virginia - Connecticut
  24. Mention – private debt collection issue
  25. At 10 minutes before the published end time, presenter or facilitator invite participants to answer this question in text. Wait at least 60 seconds for replies. Thank participants for attending and for responding and ask a Follow up question verbally: “What will you DO with the information you learned?” Discuss responses, then ask of all participants “What else do you have questions about regarding today’s topic?” Wait a minimum of 60 seconds. Answer questions and provide additional resources as appropriate.
  26. To minimize the amount of information a thief can steal, do not carry extra credit cards, your Social Security card, a birth certificate or a passport in your wallet or purse, except when needed. To reduce the amount of personal information that is “out there,” consider removing your name from the marketing lists of the three credit reporting bureaus. This will limit the number of pre-approved offers of credit that your receive. * Sign up for the Direct marketing Association’s Mail Preference Service and the Telephone Preference Service. Your name is added to computerized name deletion lists used by nationwide marketers. * Have your name and address removed from the phone book and reverse directories (i.e., directories that list people by their addresses rather than their names). * Don’t put your Social Security number on checks. Ask your financial institution to add extra security protection to your account. Most will allow you to use an additional code (a number or word) when accessing our account. If you become a victim of identity theft, report the crime to the police immediately. Give them as much documented evidence as possible, and get a copy of the police report. Credit card issuers, banks, and the insurance company may require you to show the report in order to verify the crime. Then report your case to the federal authorities. The Federal Trade Commission has a special identity theft hotline to provide information to consumers and take complaints from victims by phone (1-877-438-4338) or online (www.consumer.gov/idtheft). As soon as possible, call the fraud units of the three major credit bureaus. Ask to have a fraud alert placed on your credit report -- this will let companies know that someone else has been using your information and that you wish to be informed by phone before any new credit is granted. Close the accounts and get replacement cards with new account numbers.